Home > Learning Activity 7-D-1 and 7-D-2



Learning Activity 7-D-1 and 7-D-2 Wiki Instructions


To add your lesson plan (7-D-1):

  1. Click the Edit tab in the upper-right corner.
  2. Scroll down the page until you see the first empty lesson plan space.
  3. Highlight the "Your Name" text.
  4. Type your name.
  5. Highlight the "Enter Lesson Plan here." text.
  6. Type or copy and paste your lesson plan.
  7. Press Save on the Editor bar.

To add your permission letter (7-D-2):

  1. Click the Edit tab in the upper-right corner.
  2. Scroll down the page until you see the Permission Letter section directly under your lesson plan.
  3. Highlight the "Enter Permission Letter here." text.
  4. Type or copy and paste your permission letter.
  5. Press Save on the Editor bar.

To comment on a classmate's lesson plan and/or permission letter:

  1. Click on the Discussion tab in the upper-right corner (next to Edit).
  2. Click the New Post button.
  3. In the Subject field, enter the name of your classmate followed by "Lesson Plan Feedback" (ex. Laura's Lesson Plan Feedback).
  4. In the Message field, type in your feedback.
  5. Click Post.


Megan Jagoda

Lesson Plan


Permission Letter



Wendy Reynolds-Imundo

Lesson Plan

LESSON PLAN FOR ADULTS:
Internet Privacy in Social Media: It’s Your Information, But Who’s Keeping Tabs On It?

Objective

Students will explore the concept of Internet privacy, and understand that social media websites collect personal information from users that may later be sold on to other companies, used in targeted marketing campaigns, or be provided to the NSA for investigative purposes.

Goals

  • Students will be able to explore the concept of personal privacy in an online setting.
  • Students will be able to comprehend and explain how and why social media companies collect information about visitors to their websites.
  • Students will be able to define and use online privacy terms in a written document.
  • Students will be able to explain both verbally and in a written document that websites are required to post privacy policies, and why.

Standards

For NY teachers

  • HPF2.C.HE1A Students recognize hazardous conditions in the home, school, work place, and community and propose solutions to eliminate or reduce them.

  • HPF2.C.HE1B Students evaluate personal and social skills, which contribute health and safety of self and others.

  • HPF2.C.FC1D Students apply basic rules of health and safety to a variety of home and work place situations.

Materials and Preparation

  • Paper and pens
  • Privacy Policy Project handouts
  • Computers with an Internet connection
  • Class set of print outs of the privacy policies from two websites that students commonly use (Twitter, Pinterest, and Facebook are all recommended)

Key Vocabulary

Anonymous, cookies, third party, privacy options, privacy policy

Introduction

“We’ve all heard on the news about the NSA, and how the government is able to track our every move on the Internet and use this information in any investigations that relate to homeland security – for example, a terrorist plot. They receive this information from the social media websites we visit, such as Facebook, Twitter, and Pinterest. They track our information to use for marketing and advertising purposes, or possibly sell it to other companies who advertise on their sites for them to use. But what many people don’t realize is that the law requires social media and other websites to publish what personal information they collect from users, how they collect it, and what they may do with it. Today, you’re going to do a little ‘investigating’ yourselves on two of the websites you use most often, and discover where this information is, and what it means.”

Review vocabulary words, troubleshoot questions.

Instruction

  • “Every social media website – in fact, every website – has a privacy policy. It is usually listed in the small print at the bottom of the home page. Find the words Privacy, or Privacy Policy, click on them, and you’ll have discovered the answers you’re looking for.”

  • Students should log on to their computers, go to their assigned social media websites, and find the privacy policy. On their handouts, have them check off the words that they find on the site, and answer the questions about personal information and privacy options.

  • Call on students to share what they found out about the kinds of information their social media sites collect, and how the sites use the information. Does their site collect personal information? Does it use cookies, or does it give out data to third parties? Does it give them a choice of privacy options?

  • Make sure students understand the difference between social media sites that collect personal information such as names, addresses, and email, and other websites that collect other information about things they do on the Internet, but keep the identities of their visitors anonymous. Remind students that when they participate in contests and surveys on Facebook that are run by third party companies, they must read their privacy policies as well – Facebook is not responsible for the data those contests collect, or what is done with it.

Assessment

Blog Post: “Why do social media websites gather personal information? How is it done? What do you get in return for the information? How can you judge whether or not sharing your information is worth it?” In their answers, students should show understanding that what they receive in return for their personal information is actually free access to the social media website, or to the third-party contests, surveys, etc. that are hosted on the websites. Students should demonstrate understanding and mastery by using the vocabulary words correctly in context in their answer: Anonymous, cookies, third party, privacy options, privacy policy

Grading

Participation in online discussion: 10 points

Blog post: 15 points



Permission Letter



Karen Senior

Lesson Plan

Blogging Guidelines Lesson Plan – Grade 4
Objective/Goal: To teach 4th grade students how to safely and responsibly post and comment on blogs.
Technology: Blogs (KidBlog if you want a secured site; WordPress if you want a more global audience)
Using Blogs: Students will post a variety of blogs on their account. These blogs will be focused on Reading and could include: a response to literature; retelling the story from a different perspective; having a book club discussion; or general topics they’d like to share with their audience.
Expected Behavior: Students will write posts and comments on the blogs that follow the established guidelines below (reflecting safety and appropriateness). Students will respond in an appropriate fashion if inappropriate content or material is found. Students will not seek out inappropriate content or material.
Process for Teaching: Instead of just establishing guidelines, I feel that it’s important for my novice bloggers to understand what blogging is. Therefore, the early lessons focus on building a foundation of what is blogging and why do we do? Once they understand that concept and before they start on their own, the guidelines will be established and shared with parents.
Lesson 1: Just getting started!
Lesson 2: What is a blog?
  • Have students work with a partner on their laptop to search for other examples of classroom or student blogs. The blogs that won the 2012 classroom or student awards are located at the following link: http://edublogawards.com/
  • As the students are looking at the blogs, have them discuss these three questions: What do we see? What do we think? What do we wonder?
  • Have a whole class discussion making a general chart of their findings. What are some examples of what blogs are used for? What are some key features of blogs?

Lesson 3: Establishing Blogging Guidelines
  • Send home parent permission slip
  • Discuss online safety and come up with guidelines for safe and appropriate blogging. These guidelines should be posted in the classroom for reference and review.
    • Only post things that you would want everyone (in school, at home, in other countries) to know
    • Think about the future – what will people think a few days, weeks, months from now, if they read your post;
    • Don’t share personal information like: last name, mom’s maiden name, address, telephone number, password, birthdate, username, passport information, license plate number, picture of your face, full name of yourself or your friends
    • Choose a complicated password for others, but easy for you to remember
    • Think before you post
    • Use only your first name or an avatar (made up name that represents you)
    • Don’t talk to strangers. Get a parent or an older brother or sister to help you.
    • Only say nice things about other people.
    • Treat other people the way you want to be treated.
    • If you think you will regret it, don’t post it
    • If you wouldn’t say it to a person’s face, do not post it online
    • Use appropriate language and good grammar and spelling
    • Think about your readers feelings (embarrassing) when you post online
    • Be culturally sensitive
    • Only post things that you can verify are true (no gossiping)
  • Discuss what to do if a student stumbles upon inappropriate content
    • Alert the teacher
    • Do not make a big fuss over it
    • Do not share it with others
    • Do not respond to that blog post

References -- I used the following websites as resources for developing my lesson plan:
http://mscofino.edublogs.org/2008/12/05/blogging-is-elementary/
http://kidblog.org/home/
http://www.educationworld.com/a_tech/techlp/techlp055.shtml


Permission Letter

Parent Permission Letter for Blogging
I’m sure you’ve heard by now that your child is participating in a Book Club! We meet as a small group once per week (every Friday at 3:00) to come together and talk about the book we’re reading. The purpose of the book club is to instill a love of reading in your child. Since we only meet once per week and they’re anxious to talk about what they’re reading, we’ve decided to start blogging.
What is a blog?
A blog is a type of website that will allow us to post our thoughts and reflections about the book we are reading. There is also a comment section where we can type a response to someone else’s post. Blogs are meant to build writing and communication skills since they are now writing for an audience. Our blog will be a “by invitation only” site (saved for Brecknock Elementary students and staff; and the bloggers parents); however, bloggers have the capability of reaching people around the globe! We encourage parents to get involved and read and comment on the student’s posts. This will show them that they have an audience and their voice is being heard.
Since blogging is relatively new for the students, we are using KidBlog, which is a safe and secure way to blog. As the teacher, I will have control over student blogs and user accounts. All posts will have to be approved by me before appearing on the blog.
How will we use it?
Each week during our book club, the students decide how many pages they will read before the next time. During the course of the week, they will begin posting blogs about what they’re reading. Their posts should be reflective of their reading (but not a summary). The posts are meant to build discussions between the book club members. (For example, “I thought it was really cool when I read that some lizards can lose their tails to protect themselves! Did you know that? What did you think was really cool that you read?”)
When will we use it?
Students will be able to go on their blog occasionally in their regular classroom and during computer lab time. I highly encourage them to go on at home too if they have a computer with internet access. Directions for working at home will be provided. Every child will have their own username and password to login.
Blogging Terms and Conditions:
We established the following guidelines for blogging, which closely mirrors the Acceptable Use Policy you signed at the beginning of the year. These guidelines include:
    • Only post things that you would want everyone (in school, at home, in other countries) to know
    • Think about the future – what will people think a few days, weeks, months from now, if they read your post;
    • Do not share personal information like: last name, mom’s maiden name, address, telephone number, password, birthdate, username, passport information, license plate number, picture of your face, full name of yourself or your friends
    • Think before you post
    • Only say nice things about other people. Treat other people the way you want to be treated.
    • If you think you will regret it, don’t post it
    • If you wouldn’t say it to a person’s face, do not post it online
    • Use appropriate language and good grammar and spelling
    • Think about your readers feelings (embarrassing) when you post online
    • Be culturally sensitive
    • Only post things that you can verify are true (no gossiping)
    • If you stumble upon something inappropriate, tell your teacher or parent immediately.
Permission
Before your child may start posting to their blog, we are asking for you and your child to discuss and sign this form and return it to Ms. Senior.

I have read and understood these blogging terms and conditions. I agree to uphold them.
Student’s Signature:_ date:
Parent’s Signature: _ date:


Jessie Kilgore

Lesson Plan


Safe Blogging Lesson Plan – Grade 8
Objective/Goal:To teach 8th grade students how to blog safely.
Technology: WordPress Blog
How the Technology Will Be Used: Students will create a blog account on WordPress. The purpose of the blog is to chronicle their experiences and thoughts during the annual college tour that 8th grade students participate in. At the conclusion of each college tour, students will be given computer access at a campus computing station. Students will then post blogs on their account. These blogs will be focused on the campus environment, the offerings, student activities, overall likeability and comparisons to other colleges/universities visited. Students will also respond to their classmates blogs.
Expected Behavior: Students will post on their blogs and comment on the blogs of their classmates. It is expected that the students will follow the guidelines listed below. If inappropriate content or material is found, students will follow the guidelines and immediately inform the facilitator. Students will not purposely seek out inappropriate content or material.
Process for Teaching:Initially, students will be placed into groups. Each group will engage in a 5-10 minute brainstorming session about blogging safety. At the conclusion of the brainstorming, the students will create a Do’s and Don’ts list regarding blogging safety. The students will then be given several websites that have been vetted to determine the accuracy of their lists. After updating their lists, students will be tasked with creating a 60 second skit regarding blogging safety. Students will perform their skits which will be taped for use in a culminating videocast.
Blogging Guidelines
While it is fully expected that students will come up with appropriate blogging safeguards through their own research, students will still be given a blogging safety guidelines handout with will include the information below:
Students will be instructed to:
  • Never offer any personal information including your last name, contact information, home address, phone numbers, school's name, email address, last names of friends or relatives, instant messaging names, age, or birth date.
  • Never post provocative pictures of yourself or anyone else, and be sure any images you provide do not reveal any of the previously mentioned information. Always remember to look at the background of a picture too.
  • Assume what you publish on the web is permanent. Anyone on the Internet can easily print out a blog or save it to a computer.
  • Use blogging provider sites with clearly stated terms of use, and make sure they can protect the actual blogs, not just the user accounts, with password protection. (Even so, it's better to assume anyone can see it.)
  • Avoid trying to "outdo" or compete with other bloggers.
  • Keep blogs positive and don't use them for slander or to attack others.
http://www.microsoft.com/security/family-safety/blogging.aspx

Permission Letter


Dear 8th Grade Families:
As you are aware, your 8th grade student will be participating in our annual College Tour. This year we will visit several universities and colleges in Michigan, Ohio, Washington, D.C., Maryland and Virginia. Our visits will range from large universities such as The University of Michigan to premier HBCU’s such as Howard University. In an effort to allow you to share in your student’s experience, this year each student will host a blog to chronicle their experiences.

A Weblog, or blog as they are commonly called, is a special type of Web page that can be created and easily updated using a Web browser. Each new entry has its own date stamp. Each entry has a comments section where visitors to the blog may leave comments for the author.

How it Works

At the conclusion of each college tour, students will be given computer access at a campus computing station. Students will then post blogs on their account. These blogs will be focused on the campus environment, the offerings, student activities, overall like-ability and comparisons to other colleges/universities visited.
What makes blogging fun for the students is having a real audience. In addition to receiving comments from me, students will also receive comments from their classmates. Parents are also invited to visit the blogs and respond to the writing. Potentially, anyone on the Internet could respond to our blogs, however, it is not likely that the world at large will stumble across them.
Security
This blogging project is designed to minimize risk to your child. The only personally identifying information included in the blog will be their first name. There will be no mention of our school name or our location. Students are allowed to post their interests and opinions, but not their age, email address, photographs of themselves, or other sensitive information.

Assessment
The blog assignments will be part of your child’s language arts grade this term. As with other projects they have completed this year, students will receive a scoring rubric that explains the expectations for these assignments. The rubric will include a section for the comments they leave in other students’ blogs.

Resources

In case your child asks you create a blog outside of school as a result of this experience, I offer the following advice.
A quick blogging primer for parents
Although keeping a blog offers potential benefits, including improved writing skills and communication, it's important to educate your kids about the Internet and blogging before they begin-much like completing driving school before hitting the road solo. Here are a few suggestions to get started:
  • Establish rules for online use with your kids and be diligent.
  • Screen what your kids plan to post before they post it. Seemingly innocuous information, such as a school mascot and town photo, could be put together to reveal where the author goes to school.
  • Ask yourself (and instruct your kids to do the same) if you are you comfortable showing any of the content to a stranger. If in doubt, have them take it out.
  • Evaluate the blogging service and find out if it offers private, password-protected blogs.
  • Save the web address of your child's blog and review it on a regular basis.
  • Check out other blogs to find positive examples for your kids to emulate.

Your student should also be instructed to:
  • Never offer any personal information including your last name, contact information, home address, phone numbers, school's name, email address, last names of friends or relatives, instant messaging names, age, or birth date.
  • Never post provocative pictures of yourself or anyone else, and be sure any images you provide do not reveal any of the previously mentioned information. Always remember to look at the background of a picture too.
  • Assume what you publish on the web is permanent. Anyone on the Internet can easily print out a blog or save it to a computer.
  • Use blogging provider sites with clearly stated terms of use, and make sure they can protect the actual blogs, not just the user accounts, with password protection. (Even so, it's better to assume anyone can see it.)
  • Avoid trying to "outdo" or compete with other bloggers.
  • Keep blogs positive and don't use them for slander or to attack others.

http://www.microsoft.com/security/family-safety/blogging.aspx

Permission

Before your child may start posting to their blog, we are asking for you and your child to discuss, sign and return the following form.

Blogging Terms and Conditions
  1. Students using blogs are expected to act safely by keeping personal information out of their posts. You agree to not post or give out your last name, contact information, home address, phone numbers, school's name, email address, last name of friends or relatives, instant messaging names, age, birth date, password, user name, city, country or other information that could help someone locate or contact you in person.
  2. You may share your interests, ideas and preferences. However, you agree not to post provocative pictures of yourself or anyone else, and be sure any images you provide do not reveal any of the previously mentioned information. Always remember to look at the background of a picture too.
  3. Students using blogs agree not to share their user name or password with anyone besides their teachers and parents.
  4. You agree to never log in as another student
  5. Students using blogs are expected to treat WordPress as classroom spaces. Speech that is inappropriate for class is not appropriate for your blog. Keep things positive and don't use your blog for slander or to attack others. While we encourage you to engage in debate and conversation with other bloggers, we also expect that you will conduct yourself in a manner reflective of a representative of this school.
  6. Student blogs are to be a forum for student expression. However, they are first and foremost a tool for learning, and as such will sometimes be constrained by the various requirements and rules of classroom teachers. Students are welcome to post on any school-appropriate subject.
  7. Student blogs are to be a vehicle for sharing student writing with real audiences. Most visitors to your blog who leave comments will leave respectful, helpful messages. If you receive a comment that makes you feel uncomfortable or is not respectful, tell your teacher right away. Do not respond to the comment.
  8. You agree not to try and "outdo" or compete with other bloggers.
  9. Students using blogs take good care of the computers by not downloading or installing any software without permission, and not clicking on ads or competitions.
  10. Students who do not abide by these terms and conditions may lose their opportunity to take part in this project.

I have read and understood these blogging terms and conditions. I agree to uphold them.

Student’s signature:_ date: _

Parent’s signature: _ date: _


Jan Thompson-Wilda

Lesson Plan

Jan’s 7-D-1 Teaching Safe Behavior
This lesson is related to the Blogging Lesson Plan posted earlier in the course and is for a class titled The Psychology of Personal Growth. The class will meet in a computer lab classroom for this lesson.

College General Education Objectives Addressed:
  • Critical Thinking
    • Identify, define, analyze, interpret, and evaluate: ideas, concepts, information, problems, solutions, and consequences.
  • Communication
    • Communicate ideas, concepts, and information through written, oral, and non-verbal means.
    • Collaborate with people of diverse backgrounds and abilities.
  • Literacy
    • Demonstrate the ability to read critically within content areas.
    • Use technology to locate, to evaluate, and to communicate: data, information, ideas, and concepts.
  • Responsibility
    • Demonstrate an understanding of responsibility in one’s academic, professional, and civic life.
    • Demonstrate an understanding of cultural and aesthetic diversity as they relate to the individual, the community, and the global society.
Objectives:
  • Students will identify safe practices in blog environments.
  • Students will make commitments to engage in safe practices in both writing blogposts and commenting on classmates’ blogposts.

Technology Used: Computers/computer labs with internet access, wordpress.com

How the Technology Will Be Used: Students will analyze and synthesize experiences from service learning placements with material learned in their personal growth class and write blogposts on their own wordpress blogs and comments on classmates’ blogs. (Separate rubrics for blog and comment directions, content and assessment will be provided. They can be viewed in the blogging lesson plans post from earlier in the course.)

Behavior Expected of Students: Students are expected to follow the guidelines that we develop together for insuring safety in a blogging environment and to follow the college’s rules for appropriate academic and student conduct as per the Student Handbook.

Process/Steps for Teaching:
  • Students will create safety guidelines for blogging on wordpress.
    • Students will search for and read a blog that interests them.
      • Students will take notes about the blog on:
        • what personal information blogger directly shares in posts or other areas of the blog
        • what personal information can be deduced from blogposts
        • observations regarding comments and replies to comments from the blogger--e.g., With regards to safety, what constitutes an appropriate comment? What would make a comment inappropriate?

      • Students will discuss findings in small groups, comparing and contrasting findings.

      • In small groups students will create one appropriate and one inappropriate comment to a blogpost.
        from one of the blogs group members read. Students will share those comments with the class and discuss their experiences with commenting or reading both appropriate and inappropriate comments online.


    • As a class, students will create online safety guidelines for blogging using the discussion and activities listed previously as prompts, researching safety online, and brainstorming techniques. Students will compare their safety guidelines with the following guidelines. The instructor will add to/comment on guidelines. The guidelines will be written up by the instructor for students to sign:

      • Don’t post any pictures, reveal your whole name or address, where you work or go to school, or any other identifying information.

      • Set up a blog that is password protected.
        • For information on the worst passwords of 2012, students will read the Aug. 2, 2012 article “Most Popular (Worst) Passwords of 2012: ‘Password’ Tops List for Second Year in a Row.”
        • Choose passwords that are combination of capital and small letters and numbers.
        • Do not reveal their passwords to other students.

      • Don’t disclose anyone else’s personal information, including from your service placement site. Do not post the name of your site or use any names of anyone associated with your placement, the address, etc.

      • Don’t use your blog for discussing any personal issues that are confidential in nature.

      • Set your blog so that you approve comments before they are posted.

      • Do no harm--Posts and comments should pass the golden rule test--treat others as you would like to be treated. Even if your post/comment doesn’t violate the college’s code of student conduct, always take the higher ground if you disagree with someone. Language, tone, content all matter.

      • “Does It Pass the Publicity Test?” (Emerson College, 2013)--If you wouldn’t say this face-to-face, over the phone or another medium, you shouldn’t say it in a blog either. Ask yourself--Is this something I would like to see published in a newspaper or an a billboard tomorrow or 10 years down the road?

      • Don’t ever agree to meet with someone who you don’t know who comments on your blog.

      • Don’t approve comments that are inappropriate in any way--language, tone, content. If unsure, consult the instructor.

      • Don’t link your blogs to other social media sites for the purpose of this class (e.g., facebook, twitter, etc.).

      • Report any safety concerns to your instructor. If you approve a comment that you later think is inappropriate, go back into your comments section on the dashboard and unapprove it.

    • Students will read the Academic Integrity and Student Conduct policies and ask any questions they have of the instructor. The instructor will explain that these policies apply to any activities related to the college, including this service learning project and blogging.

    • Students will make commitments to engaging in safe and appropriate online blogging and commenting by signing an agreement to follow those guidelines.

Consequences for not following guidelines and/or college’s code of student conduct:
  • Students who violate safety guidelines in a blogpost or comment as outlined in class and in the agreement signed will be pulled from the community placement, resulting in a 0 for the community service project. This is to protect both the student community as well as the community service agency community.

  • Students who engage in academic misconduct will be subject to the actions outlined in the college’s policy on academic integrity.

  • Students who engage in behavior that violates the Code of Student Conduct in a blogpost or comment will result in the instructor writing up a code of student conduct report. The student will then be required to meet with and accept any sanctions determined by the college’s judicial officer. (Students have the right to due process in any conduct issue.)

References

Biology in Action. (2013). About. Retrieved from: http://biologyblog.edublogs.org/about/

Emerson College. (2013). Social media guidelines. Retrieved from: http://www.emerson.edu/policy/social-media-guidelines

HuffPost Tech. (2013, August 2). Most popular (worst) passwords of 2012: ‘Password’ tops list for secon year in a row. Retrieved from: http://www.huffingtonpost.com/2012/10/25/most-popular-worst-passwords-of-2012-splashdata_n_2018587.html

Oakton Community College. Code of Academic Conduct. Retrieved from:

http://www.oakton.edu/studentlife/academic_conduct/index.php
Oakton Community College. Code of Student Conduct. Retrieved from:

http://www.oakton.edu/about/officesanddepartments/public_safety/services_resources/code_student_conduct/index.php
Office of Institutional Research, Oakton Community College. (2009). Program Review Manual. Retrieved from: http://www.oakton.edu/about/officesanddepartments/oir/research/progreview.pdf

Rowse, D. Blog Stalkers. (2006, February 7). [Web log comment]. Personal Safety for Bloggers. Retrieved from: http://www.problogger.net/archives/2006/02/07/blog-stalkers-personal-safety-for-bloggers/

Permission Letter

Student Agreement for Blogging on Service Learning Experiences--Since I teach at the college level I would not be seeking parent permission for this activity.

Please read the following statements and sign below if you agree to follow these guidelines and understand the consequences for violating these guidelines. Please ask any questions you have before you sign this document.

  • I have read the safety guidelines below and agree to follow these guidelines for blogging and commenting on classmates’ blogs on wordpress.com.
  • I understand that the college’s Academic Integrity policies and Code of Student Conduct policies apply to my behavior in any interactions that are associated with this class, including on wordpress.com.
  • I have read and understand the conduct rules as outlined in the Code of Student Conduct. I understand that if I violate any of the college’s rules in the Code of Student Conduct, my instructor will write up a Code of Student Conduct report and I will be called to meet with the judicial officer of the college and will, after a due process hearing, possibly face additional sanctions from the college.
  • I have read and understand the academic policies on cheating, plagiarism, etc. as outlined in the Student Handbook. I understand that if I violate any of the college’s Academic Integrity policies my instructor will decide whether to handle this informally or formally.
  • I understand that if I violate any of the safety guidelines below I will get a 0 for the community service project and will be pulled from the community service placement.

Safety Guidelines: (Students will develop these as a class; instructor will add guidelines not thought of by students. They will look something like what I included in the classroom process part of this assignment):
  • Don’t post any pictures, reveal your whole name or address, where you work or go to school, or any other identifying information.
  • Set up a blog that is password protected.
    • For information on the worst passwords of 2012, read the Aug. 2, 2012 article “Most Popular (Worst) Passwords of 2012: ‘Password’ Tops List for Second Year in a Row.”
    • Students will choose passwords that are combination of capital and small letters and numbers.
    • Students will not reveal their passwords to other students.
  • Don’t disclose anyone else’s personal information, including from your service placement site. Do not post the name of your site or use any names of anyone associated with your placement, the address, etc.
  • Don’t use your blog for discussing any personal issues.
  • Set your blog so that you approve comments before they are posted.
  • Do no harm--Posts and comments should pass the golden rule test--treat others as you would like to be treated. Even if your post/comment doesn’t violate the college’s code of student conduct, always take the higher ground if you disagree with someone. Language, tone, content all matter.
  • “Does It Pass the Publicity Test?” (Emerson College, 2013)--If you wouldn’t say this face-to-face, over the phone or another medium, you shouldn’t say it in a blog either. Ask yourself--Is this something I would like to see published in a newspaper or an a billboard tomorrow or 10 years down the road?
  • Don’t ever agree to meet with someone who you don’t know who comments on your blog.
  • Don’t approve comments that are inappropriate in any way--language, tone, content. If unsure, consult the instructor.
  • Don’t link your blogs to other social media sites for the purpose of this class (e.g., facebook, twitter, etc.).
  • Report any safety concerns to your instructor.


Student Signature Date


Instructor Signature Date

Violation of Academic Integrity: The instructor will determine whether to engage in an informal resolution of complaint or initiate a formal resolution of complaint. (Students have the right to due process in a formal resolution; an informal resolution is used as a learning opportunity.)
http://www.oakton.edu/studentlife/academic_conduct/index.php

Violation of Code of Student Conduct: The instructor will write up a Code of Student Conduct report.
http://www.oakton.edu/about/officesanddepartments/public_safety/services_resources/code_student_conduct/index.php


References

Biology in Action. (2013). About. Retrieved from: http://biologyblog.edublogs.org/about/

Emerson College. (2013). Social media guidelines. Retrieved from: http://www.emerson.edu/policy/social-media-guidelines

HuffPost Tech. (2013, August 2). Most popular (worst) passwords of 2012: ‘Password’ tops list for secon year in a row. Retrieved from: http://www.huffingtonpost.com/2012/10/25/most-popular-worst-passwords-of-2012-splashdata_n_2018587.html

Oakton Community College. Code of Academic Conduct. Retrieved from:

http://www.oakton.edu/studentlife/academic_conduct/index.php
Oakton Community College. Code of Student Conduct. Retrieved from:

http://www.oakton.edu/about/officesanddepartments/public_safety/services_resources/code_student_conduct/index.php

Rowse, D. Blog Stalkers. (2006, February 7). [Web log comment]. Personal Safety for Bloggers. Retrieved from: http://www.problogger.net/archives/2006/02/07/blog-stalkers-personal-safety-for-bloggers/

Sandra Beauchamp

Lesson Plan

Lesson Title: Introduction to Online Ethics

Lesson Objectives. :

Collaboratively, students will learn about online ethics, how to protect their own privacy online, and how to respect the privacy of others.

Students will ethically upload personally created videos to the web.

Students will learn to control privacy settings for Youtube, Vimeo, Metacafe, and Blip.tv.

  • Technology which will be used (blogs, wikis, RSS, Flickr, etc.)

-Youtube.com

-Vimeo.com

-metacafe.com

-blip.tv

  • Brief explanation of how the technology will be used

Students will create a brief 3-5 minute video that will illustrate what they have learned about online ethics in order to teach this to their classmates and others outside of the classroom.

  • Description of what behavior is expected of students

After reading and learning about online ethics, students should demonstrate academic integrity by locating and using appropriate Internet sources in their research; by citing aforementioned sources using the correct documentation style; by creating a credits list for all group members; by evidently participating in all steps of the project.

  • Process or steps for teaching (i.e., what you will actually do in the classroom)

  1. Students will respond to a Writing Warm-Up prompt asking them to discuss how they feel about the issue of online privacy and whether or not they are concerned about the personal information they share online (Facebook, Twitter, Flickr, FourSquare, etc.) being used unethically without their knowledge.

  2. After discussing their responses, we will read selected articles about technology, privacy and ethics.

  3. Students will be arranged into groups and be directed to create a 3-5 minute video on what they have learned in order to share with others on a video-sharing site of their choice. (Students will have the option of selecting their own privacy options).

  4. Students will have some class time to plan, prepare, and outline their projects. Storyboards and scripts will need to be collaboratively created.

  • What actions you will take and how you expect your students to respond if they find inappropriate content

Because my students are college level adults, this is less of a concern. They are expected to follow the Student Code of Conduct or face disciplinary consequences through the college judiciary board.

However, when we spend time in the computer lab, they are expected to conduct themselves ethically and visit only those sites that pertain to the creation of the project. Any student who is discovered viewing inappropriate material online during class session will be asked to leave the class and will not be allowed to return until remediation procedures have been followed through the Center for Counseling and Advising.

  • Sources and Links:

Dunn, J. (2011). “The Teacher’s Guide to Using Youtube in the Classroom.” Edudemic. http://www.edudemic.com/2011/09/youtube-in-classroom/

“Privacy Student Intro Video—The Digital Footprint.” (Nov. 2, 2010). CommonSenseMedia. YouTube video. http://www.youtube.com/watch?v=DinW62zlWcc

“YouTube Community Guidelines.”

http://www.youtube.com/t/community_guidelines

“Video Privacy Settings.” Youtube. https://support.google.com/youtube/answer/157177?hl=en


Permission Letter

Student Agreement Form for Ethical Online Behavior

Class: Com102, adult college learners

Because this unit of instruction revolves around learning about and implementing ethical online behavior, it is crucial that you understand the academic expectations for uploading your videos to YouTube and other video hosting sites.

Please read and become familiar with the guideline as presented by Youtube.com:

http://www.youtube.com/t/community_guidelines

Expectations of Student Behavior:

  • When we spend time in the computer lab, all students are expected to conduct themselves ethically and visit only those sites that pertain to the creation of the project.

  • Any student who is discovered viewing inappropriate material online during class sessions will be asked to leave the class and will not be allowed to return until remediation procedures have been followed through the Center for Counseling and Advising.

  • The use of gratuitous profanity, obscene images, or hate speech in any student created video is a violation of the student code of conduct and will result in immediate disciplinary action.

  • Using someone’s image in a video/presentation without permission is a violation of the Student Code of Conduct.

  • All research used to create video presentations for this class will be carefully cited using the appropriate MLA guidelines in order to avoid plagiarism.

Protect yourself, your identity, and your integrity:

  • When creating your online accounts for social media sites, choose the most uncompromising privacy policies.
  • Create “Fort Knox” passwords and don’t share them with anyone else.
  • Avoid sharing identifying information over the web.
  • Think before you post and share; what goes on the web usually stays on the web.


“By signing this contract agreement, I agree that I have read and understood the guidelines and expectations for student conduct as presented in the Official Code of Student Conduct for Moraine Valley. I understand that any violation of the aforementioned guidelines and expectations will have serious consequences including but not limited to a hearing in the Student Judicial Affairs office.”


Student Name (Print)_
Student Signature_
Date:

Resources:


http://www.morainevalley.edu/conduct/code.htm

https://help.blackboard.com/en-us/Learn/9.1_SP_10_and_SP_11/Student/020_Your_Personal_Blackboard/080_Protect_Reputation_and_Identity_Online


http://staysafeonline.org/








Matt Neil

Lesson Plan


Objective: Students will be able to explain out loud and in writing how to safely use our classroom blog. Students will be able to post comments and replies that are substantive, as measured by depth of knowledge of history and original thought.

Technology used and how it is used: Classroom blog used for historical discussions, writing historical fiction, and sharing students’ ideas about history!

Process:

1. Have the students go to our classroom blog and give them the reason for why we use blogging and explain that they are going to become published authors.

2. Explain the responsibility and trust you have in them and that they are learning a real world skill. Have all the students post practice posts.

3. Show examples of strong student comments and comments that do not meet the guidelines. Ask students why some comments are approved and some aren’t.

4. Students post practice comments - have them post with a partner checking them. Comments should be spelled correctly, use proper grammar, and add to the discussion. I’ve found that holding students to high standards with these other things helps get them focused and appropriate.

5. One kid will test you with an inappropriate comment at this point, especially the boys. In response, I simply change their comment to “I love puppies and rainbows. They are so beautiful.” If they continue to test me, I just smile and change their next comment to “Justin Bieber is the best. I’m a Belieber.” This shows that you are monitoring the comments and is a very “sticky” way to get it across to anyone considering trolling or posting negative comments that you can handle it. It also makes the kids laugh.

6. At this point pass out a letter that is to be taken home and signed by parents. Explain what digital citizenship means and the importance of safety online.

7. Go through the document and discuss it with the kids, especially the behavior that is expected of them as per the Good Citizenship, Digital Responsibility, and Safety Agreement.

Actions for inappropriate content: For mildly inappropriate comments, delete the post, pull the student aside and ask “why,” look them in the eye and explain that they are not to do it, and move forward. If it happens again, issue a discipline referral and call home. If the inappropriate content is bullying or obscene, immediately issue a discipline referral and call home.
.

Permission Letter

I decided to write a letter that I could actually use for my class. Because we use many different types of technologies in class it would be a much better idea to write a letter explaining all of them rather than one single technology. If I had to send a letter home for every piece of tech I used, that would be a lot of paper.


Here’s a question I had: Do we need to ask permission to use these tools or is permission assumed? These are tools that I use every day and I depend on them for the functioning of my class. It would be a big problem if say three kids in every class were not allowed to participate.



Dear Parent/Guardian,


I’m so excited to be teaching your child this year! We are going to be learning so much together. Your child will be learning much about our history and culture, as well as many important skills that will prepare them for college and the real world:)


As part of our curriculum we utilize collaborative technologies to help our kids learn. In my classroom we have a cart of computers that the students will have access to daily. It is my belief that it is my job to help set my students up for success and prepare them for the rest of their lives. Of course I’m concerned with how they do in my class, but what I’m far more concerned with is how well they do once they leave my classroom.


We use technology so that your child can learn more, learn in a more engaging and interesting way, and practice 21st century skills that will help him or her succeed!


All of the tools that have been chosen for use have been tested by myself, other teachers, and many students who have come before them.


The major technologies I use are listed below:


Google Docs - Document and presentation creation, collaboration, shared notebooks (I use these as a way for the students to take notes). The notebooks are shared with me so that I can help improve their understanding and writing.


Gmail - Communication. Each student has a school email address that they can use for professional communication.


Remind101 - I use this to send out updates via email and cell phones. This number cannot be texted back to so it is a safe way for me to inform parents and students about assignments, praise my classes, and keep you all informed:)


Blogging - We blog because it helps your child develop strong writing skills and also because it helps him or her understand our history more deeply and become directly involved in it. We also blog because it allows our students to be published. They can now share their ideas with others!


Edmodo - We use Edmodo for posting assignments, discussions, and discussing current events and news. Edmodo is a closed system and only accessible to students, teachers, and parents.


Good Citizenship, Digital Responsibility, and Safety Agreement


Students are expected to use good manners when interacting with other students online and in person. They should treat others the way they wish to be treated, with respect and dignity.


Students should not post their real names, address, school name, city, country or other personally identifiable information.


Students are free to express their ideas and opinions as long as they are respectful and abide by all school rules.


As a student, if you ever receive an email, comment, or any form of communication that makes you uncomfortable, tell your teacher immediately. Do not respond to the communication. As a student, if you receive emails with offers from companies or people you don’t know, please do not open the email or click on the link. What you are seeing is probably spam. Let your teacher know and we will report it as spam!


I have read, understand, and agree to follow the above terms for Good Citizenship, Digital Responsibility, and Safety Agreement.

Student Signature:

Parent Signature (I've tried to format these many times and the wiki keeps messing them up so am just posting here in plain text):

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Scott Burmeister

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Allison Paruch

Lesson Plan

Permission Letter



Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.

Your Name

Lesson Plan

Enter Lesson Plan here.

Permission Letter

Enter Permission Letter here.